nsz5ed5.tmp

The file nsz5ed5.tmp has been detected as a potentially unwanted program by 21 anti-malware scanners. The program is a setup application that uses the NSIS (Nullsoft Scriptable Install System) installer, however the file is not signed with an authenticode signature from a trusted source. The file has been seen being downloaded from d2htwdv930b0cg.cloudfront.net. While running, it connects to the Internet address cdn-208-111-128-7.lga.llnw.net on port 80 using the HTTP protocol.
MD5:
c541ad13b619cd9b7965d0339cc5faf7

SHA-1:
a8dcc507007cbd1b6625aeec5b8315db89ccb109

SHA-256:
ce3b578e7d3cd8e6fd2895e9d98a6917422df20f78b183928aec2e112b4258a4

Scanner detections:
21 / 68

Status:
Potentially unwanted

Analysis date:
4/26/2024 11:39:13 PM UTC  (a few moments ago)

Scan engine
Detection
Engine version

Lavasoft Ad-Aware
Trojan.GenericKD.2459819
584

Arcabit
Trojan.Generic.D2588AB
1.0.0.425

avast!
Win32:Adware-gen [Adw]
2014.9-150701

Baidu Antivirus
Adware.Win32.Downloader
4.0.3.1571

Bitdefender
Trojan.GenericKD.2459819
1.0.20.910

Emsisoft Anti-Malware
Trojan.GenericKD.2459819
8.15.07.01.07

ESET NOD32
Win32/Adware.ConvertAd.RK (variant)
9.11756

F-Secure
Trojan.GenericKD.2459819
11.2015-01-07_4

G Data
Trojan.GenericKD.2459819
15.7.25

K7 AntiVirus
Adware
13.204.16179

Kaspersky
UDS:DangerousObject.Multi.Generic
14.0.0.1948

McAfee
Artemis!C541AD13B619
5600.6718

MicroWorld eScan
Trojan.GenericKD.2459819
16.0.0.546

nProtect
Trojan.GenericKD.2459819
15.06.08.01

Panda Antivirus
Trj/CI.A
15.07.01.07

Qihoo 360 Security
HEUR/QVM42.1.Malware.Gen
1.0.0.1015

Sophos
Generic PUA KI
4.98

SUPERAntiSpyware
Trojan.Agent/Gen-FakeDefender
9838

Trend Micro House Call
TROJ_GEN.R01TB01F915
7.2.182

Vba32 AntiVirus
suspected of Trojan.Downloader.gen
3.12.26.4

VIPRE Antivirus
Trojan.Win32.Generic
40962

File size:
116.1 KB (118,917 bytes)

Installer:
NSIS (Nullsoft Scriptable Install System)

Common path:
C:\users\{user}\appdata\local\temp\nsz5ed5.tmp

File PE Metadata
Compilation timestamp:
12/6/2009 4:35:52 AM

OS version:
4.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
6.0

CTPH (ssdeep):
3072:YgXdZt9P6D3XJjCCtD+Yy30lVRLuP7+lQUp3KO9o4smY:Ye34gC9+F3YvbldhKktY

Entry address:
0x30FA

Entry point:
81, EC, 80, 01, 00, 00, 53, 55, 56, 33, DB, 57, 89, 5C, 24, 18, C7, 44, 24, 10, 60, 91, 40, 00, 33, F6, C6, 44, 24, 14, 20, FF, 15, 30, 70, 40, 00, 68, 01, 80, 00, 00, FF, 15, B0, 70, 40, 00, 53, FF, 15, 7C, 72, 40, 00, 6A, 08, A3, 18, EC, 42, 00, E8, F1, 2B, 00, 00, A3, 64, EB, 42, 00, 53, 8D, 44, 24, 34, 68, 60, 01, 00, 00, 50, 53, 68, 98, 8F, 42, 00, FF, 15, 58, 71, 40, 00, 68, 54, 91, 40, 00, 68, 60, E3, 42, 00, E8, A4, 28, 00, 00, FF, 15, AC, 70, 40, 00, BF, 00, 40, 43, 00, 50, 57, E8, 92, 28, 00, 00...
 
[+]

Entropy:
7.7311

Packer / compiler:
Nullsoft install system v2.x

Code size:
23.5 KB (24,064 bytes)

The file nsz5ed5.tmp has been seen being distributed by the following URL.

The executing file has been seen to make the following network communication in live environments.

TCP (HTTP):
Connects to cdn-208-111-128-7.lga.llnw.net  (208.111.128.7:80)

Remove nsz5ed5.tmp - Powered by Reason Core Security